Table of Contents
Lecture 04 - Authorization
More resources
Lecture 04 - Authorization
Lecture 04 - Authorization
More resources
Computer Security and the Internet: Tools and Jewels
⇒
Chapter 5 (pdf)